Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32546: Cross-Site Request Forgery (CSRF) in gtlwpdev All push notification for WP

0
Unknown
VulnerabilityCVE-2025-32546cvecve-2025-32546
Published: Thu Apr 17 2025 (04/17/2025, 15:47:33 UTC)
Source: CVE Database V5
Vendor/Project: gtlwpdev
Product: All push notification for WP

Description

Cross-Site Request Forgery (CSRF) vulnerability in gtlwpdev All push notification for WP all-push-notification allows Reflected XSS.This issue affects All push notification for WP: from n/a through <= 1.5.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:23:03 UTC

Technical Analysis

CVE-2025-32546 identifies a security vulnerability in the 'All push notification for WP' plugin developed by gtlwpdev, specifically versions up to and including 1.5.3. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows attackers to trick authenticated users into executing unwanted actions without their consent. CSRF attacks exploit the trust a web application has in the user's browser by sending unauthorized commands via the user's credentials. In this case, the plugin lacks proper anti-CSRF tokens or validation mechanisms to verify the legitimacy of requests. Additionally, the plugin suffers from reflected Cross-Site Scripting (XSS), which can be leveraged to inject malicious scripts that execute in the context of the victim’s browser. The combination of CSRF and reflected XSS increases the attack surface, potentially allowing attackers to hijack user sessions, manipulate plugin settings, or perform administrative actions. The vulnerability affects all versions up to 1.5.3, with no patch currently available or linked. Exploitation requires the victim to be logged into a WordPress site using the vulnerable plugin and to visit a maliciously crafted webpage or link. While no known exploits are currently in the wild, the vulnerability is publicly disclosed and should be considered a significant risk. The absence of a CVSS score requires an expert severity assessment based on the vulnerability’s characteristics.

Potential Impact

The impact of CVE-2025-32546 is significant for organizations running WordPress sites with the vulnerable 'All push notification for WP' plugin. Successful exploitation can lead to unauthorized actions performed with the privileges of the authenticated user, potentially including administrative users. This can result in unauthorized configuration changes, injection of malicious content, or disruption of push notification services. The reflected XSS component can facilitate session hijacking, credential theft, or distribution of malware via the compromised site. For organizations, this can lead to data breaches, loss of user trust, reputational damage, and potential regulatory penalties if sensitive data is exposed. The vulnerability affects the confidentiality, integrity, and availability of the affected WordPress sites. Since WordPress powers a significant portion of the web, the scope of affected systems is broad, especially for sites that rely on this plugin for push notifications. The requirement for user authentication and user interaction (visiting a malicious link) somewhat limits exploitation but does not eliminate risk, particularly for sites with many users or administrators. Overall, the threat could facilitate further attacks or persistent compromise if left unmitigated.

Mitigation Recommendations

To mitigate CVE-2025-32546, organizations should immediately audit their WordPress installations to identify if the 'All push notification for WP' plugin is in use and verify the version. Until a patch is released, consider disabling or uninstalling the plugin to eliminate the attack vector. Implement strict Content Security Policy (CSP) headers to reduce the impact of reflected XSS attacks. Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF and XSS attack patterns targeting WordPress plugins. Educate users, especially administrators, to avoid clicking on suspicious links or visiting untrusted websites while logged into the WordPress admin panel. Monitor logs for unusual activity indicative of CSRF or XSS exploitation attempts. Once a vendor patch is available, apply it promptly. Developers and site administrators should also verify that all forms and state-changing requests include anti-CSRF tokens and validate user input rigorously to prevent XSS. Regular security assessments and plugin updates are critical to maintaining a secure environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-09T11:19:56.431Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73d8e6bfc5ba1def3d34

Added to database: 4/1/2026, 7:36:56 PM

Last enriched: 4/2/2026, 3:23:03 AM

Last updated: 4/4/2026, 8:24:30 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses